Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
2fffb9e3cef7f3b779884b4d690137c10b266b56.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2fffb9e3cef7f3b779884b4d690137c10b266b56.exe
Resource
win10v2004-20220812-en
General
-
Target
2fffb9e3cef7f3b779884b4d690137c10b266b56.exe
-
Size
34KB
-
MD5
b28805a91c77bd56fb47307477c522f8
-
SHA1
2fffb9e3cef7f3b779884b4d690137c10b266b56
-
SHA256
aa4046ab8b9a2566c1a35d827ed97ce8f15e0254727d270807505f47d53aaeff
-
SHA512
c2b602132cd28cdae70d9e03609b23d27f90eb094857caeb0740b56196ae28bbd9982f864f81e145b362a4fea2379e18f21b3f94cd529363ea4a2a536eadad51
-
SSDEEP
384:kOhNuCCfNNrQKvPWXwEwZhI6hlhxggKWJUw34KljAAlGOBN3z7E7H96vEPnKvFU8:kOWNrrWXnohVxKWaihMbKW+k2RH
Malware Config
Signatures
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4908 set thread context of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe Token: SeDebugPrivilege 1716 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 4908 wrote to memory of 3932 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 80 PID 4908 wrote to memory of 3932 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 80 PID 4908 wrote to memory of 4212 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 81 PID 4908 wrote to memory of 4212 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 81 PID 4908 wrote to memory of 4288 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 82 PID 4908 wrote to memory of 4288 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 82 PID 4908 wrote to memory of 4268 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 83 PID 4908 wrote to memory of 4268 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 83 PID 4908 wrote to memory of 5044 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 84 PID 4908 wrote to memory of 5044 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 84 PID 4908 wrote to memory of 2692 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 85 PID 4908 wrote to memory of 2692 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 85 PID 4908 wrote to memory of 3372 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 86 PID 4908 wrote to memory of 3372 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 86 PID 4908 wrote to memory of 1088 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 87 PID 4908 wrote to memory of 1088 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 87 PID 4908 wrote to memory of 2736 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 88 PID 4908 wrote to memory of 2736 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 88 PID 4908 wrote to memory of 808 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 89 PID 4908 wrote to memory of 808 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 89 PID 4908 wrote to memory of 4272 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 90 PID 4908 wrote to memory of 4272 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 90 PID 4908 wrote to memory of 4724 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 91 PID 4908 wrote to memory of 4724 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 91 PID 4908 wrote to memory of 5020 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 92 PID 4908 wrote to memory of 5020 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 92 PID 4908 wrote to memory of 1200 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 93 PID 4908 wrote to memory of 1200 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 93 PID 4908 wrote to memory of 1192 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 94 PID 4908 wrote to memory of 1192 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 94 PID 4908 wrote to memory of 1100 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 95 PID 4908 wrote to memory of 1100 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 95 PID 4908 wrote to memory of 3068 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 96 PID 4908 wrote to memory of 3068 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 96 PID 4908 wrote to memory of 1488 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 97 PID 4908 wrote to memory of 1488 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 97 PID 4908 wrote to memory of 1460 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 98 PID 4908 wrote to memory of 1460 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 98 PID 4908 wrote to memory of 1456 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 99 PID 4908 wrote to memory of 1456 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 99 PID 4908 wrote to memory of 1896 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 100 PID 4908 wrote to memory of 1896 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 100 PID 4908 wrote to memory of 1800 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 101 PID 4908 wrote to memory of 1800 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 101 PID 4908 wrote to memory of 2856 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 102 PID 4908 wrote to memory of 2856 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 102 PID 4908 wrote to memory of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 PID 4908 wrote to memory of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 PID 4908 wrote to memory of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 PID 4908 wrote to memory of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 PID 4908 wrote to memory of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 PID 4908 wrote to memory of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 PID 4908 wrote to memory of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 PID 4908 wrote to memory of 1716 4908 2fffb9e3cef7f3b779884b4d690137c10b266b56.exe 103 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fffb9e3cef7f3b779884b4d690137c10b266b56.exe"C:\Users\Admin\AppData\Local\Temp\2fffb9e3cef7f3b779884b4d690137c10b266b56.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:3932
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:4212
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:4288
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"2⤵PID:4268
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\CasPol.exe"2⤵PID:5044
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:2692
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:3372
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:1088
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:2736
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:808
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:4272
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:4724
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:5020
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:1200
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:1192
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:1100
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:3068
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:1488
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:1460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1456
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:1896
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:1800
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:2856
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1716
-